Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package shim for openSUSE:Factory checked in at 2025-08-01 22:40:03 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/shim (Old) and /work/SRC/openSUSE:Factory/.shim.new.1944 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "shim" Fri Aug 1 22:40:03 2025 rev:130 rq:1296812 version:16.0 Changes: -------- --- /work/SRC/openSUSE:Factory/shim/shim.changes 2025-07-26 13:39:50.665597991 +0200 +++ /work/SRC/openSUSE:Factory/.shim.new.1944/shim.changes 2025-08-01 22:40:04.872183856 +0200 @@ -1,0 +2,33 @@ +Thu Jul 31 12:47:58 UTC 2025 - Joey Lee <j...@suse.com> + +- Add shim-disable-dxe-get-mem-attrs.patch + - On old edk2-stable202308 ovmf, running dxe_get_mem_attrs() causes + get_hsi_mem_info() confusion on hsi_status. It looks that hsi_status + has a copy after running dxe_get_mem_attrs(). Those elements in + hsi_nx_is_enforced(), HEAPX|STACKX|ROW can NOT set into hsi_status. + Let's disabling the approach of DXE get memory attributes until + we found the root cause. + (bsc#1247432) + +------------------------------------------------------------------- +Mon Jul 28 16:25:46 UTC 2025 - Joey Lee <j...@suse.com> + +- Removed pre script in shim package for checking UEFI db has valid key + for shim because it will interrupt group update of RPMs. It should be + moved to %pretrans and re-written by lua. + +------------------------------------------------------------------- +Sun Jul 27 04:48:57 UTC 2025 - Joey Lee <j...@suse.com> + +- Add pre script to shim package for checking UEFI db has valid key for shim. + It prevents that SUSE shim be installed on a machine which can no verify + and boot with it when secure boot is enabled. + User can still install shim success when secure boot is disabled even no + valid key in UEFI db. User should aware that shim can not be boot when + secure boot is enabled. + This checking will useful for changing Microsoft or SUSE CA in the future. + The shim be signed by new MS/SUSE key will NOT be installed on a machine + which does not have new key in UEFI db when secure boot is enabled. It + can prevent booting fail after shim package is updated. + +------------------------------------------------------------------- New: ---- shim-disable-dxe-get-mem-attrs.patch ----------(New B)---------- New: - Add shim-disable-dxe-get-mem-attrs.patch - On old edk2-stable202308 ovmf, running dxe_get_mem_attrs() causes ----------(New E)---------- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ shim.spec ++++++ --- /var/tmp/diff_new_pack.OElzMU/_old 2025-08-01 22:40:05.996230681 +0200 +++ /var/tmp/diff_new_pack.OElzMU/_new 2025-08-01 22:40:05.996230681 +0200 @@ -52,8 +52,10 @@ # with the signature from the UEFI signing service. # Note: For signature requesting, check SIGNATURE_UPDATE.txt Source1: signature-opensuse.x86_64.asc +# openSUSE Secure Boot CA, 2013-2035, PEM format Source2: openSUSE-UEFI-CA-Certificate.crt Source3: shim-install +# SUSE Linux Enterprise Secure Boot CA, 2013-2035, PEM format Source4: SLES-UEFI-CA-Certificate.crt Source5: extract_signature.sh Source6: attach_signature.sh @@ -97,6 +99,8 @@ Patch5: shim-alloc-one-more-byte-for-sprintf.patch # PATCH-FIX-UPSTREAM shim: change automatically enable MOK_POLICY_REQUIRE_NX (PR #761)(bsc#1205588) - j...@suse.com Patch6: shim-change-automatically-enable-MOK_POLICY_REQUIRE_NX.patch +# PATCH-FIX-SUSE shim-disable-dxe-get-mem-attrs.patch bsc#1247432 j...@suse.com -- Disable DXE approach for getting memory attributes approach +Patch7: shim-disable-dxe-get-mem-attrs.patch BuildRequires: dos2unix BuildRequires: efitools BuildRequires: mozilla-nss-tools ++++++ shim-disable-dxe-get-mem-attrs.patch ++++++ Index: shim-16.0/memattrs.c =================================================================== --- shim-16.0.orig/memattrs.c +++ shim-16.0/memattrs.c @@ -459,6 +459,11 @@ get_hsi_mem_info(void) hsi_status |= SHIM_HSI_STATUS_HASMAP; } + if (!(hsi_status & SHIM_HSI_STATUS_HASMAP)) { + dprint(L"No memory protocol, not testing further\n"); + return; + } + get_dxe_services_table(&dst); if (dst) { dprint(L"Setting HSI from %a to %a\n",